Answer Posted / ashutosh
it's a third party authentication protocol.....
a server is maintained which keep the key of the 2 parites,
keys are matched at the server which holds the
key...........
| Is This Answer Correct ? | 2 Yes | 0 No |
Post New Answer View All Answers
What are the best discrete logarithm methods in use today ?
How is RSA used for encryption in practice?
What key management issues are involved in public-key cryptography?
What are visual secret sharing schemes?
What is primality testing ?
What is a linear feedback shift register?
What is Fortezza ?
What are CAPIs ?
What is iKP ?
At what point does an attack become practical ?
Is use of DSS covered by any patents?
Can RSA be exported from the U.S.?
What is authenticated diffie-hellman key agreement?
What role does NIST play in cryptography?
What is a digital time-stamping service?